Security Targets and Functionality paper

Anonymous
timer Asked: Nov 20th, 2016

Question description

paper is done but i need to add the missed requirements on the Dr respond that i attached

Thank u

Security Targets and Functionality paper
vcxz.png
Running Head: SECURITY TARGETS AND FUNCTIONALITY 1 Security Targets and Functionality Sony PlayStation 3 has had a number of security issues that has affected its users vastly as well as the company’s functionality. These security problems have liabilities ranging from network outages, breach of warranty and security violations. The products listed below can be applied onto Sony’s security targets and functionality. Wireless Local Area Network The products provided by Sony PlayStation 3 are applications and games that require users to go online using different versions of wireless networks. This wireless networks are very convenient and flexible to use. Wireless networks, however, have the problem that they have no physical boundary limitations. This makes them very susceptible to breach (Dinh, Lee, Niyato & Wang, 2013). This vulnerability can cause a very large threat to the personal and confidential data of the different users using such networks, for instance, a network of users using the Sony PlayStation 3 mobile application. Additionally, these vulnerabilities can be solved by specific authentication, encryption, invisibility and administrative controls that can be used together with the local area network. The security measures play a specific role of detecting, identifying and blocking any intruders that may be within the network. For example, wireless Intrusion Prevention Systems/Intrusion Detection Systems: Intrusion detection and prevention focuses on radio frequency (RF) levels. This involves radio scanning to detect rogue access points or ad hoc networks to regulate network access. With the use of advanced implementations, they are essential in visually SECURITY TARGETS AND FUNCTIONALITY 2 representing the network area. This is shown along with the potential threats. Then there is automatic categorization of capabilities such that there is easier identification of threats. Sony can also employ the Wired Equivalent Privacy (WEP. WEP is critical in providing security to WLAN. This is possible through encryption of the data that is transferred over the network. In this case, only the receivers who possess the correct encryption can decrypt the information. This encryption can mainly be used by their staff to ensure that there is no breach by outsiders who do not have access to the encryption. Firewall A firewall is a product that is used to provide security for a system that can provide functionality for Sony PlayStation3 in such a way that it prevents hacking. A firewall works in such a way that it can either be hardware or software and basing its controls on a set of rules, controls the traffic in and out of a system. That is, the firewall basically controls the access by other networks, for example, the internet. The firewall uses a positive control method where there is a firewall policy that is predefined. In this case, the firewall only allows outside networks access if they are provided for in the firewall policy, otherwise access is denied (Horn, Meylan & Kapoor, 2013). For instance to be able to block hackers, Sony Playstation3 can use proxy servers fire wall to help secure its network. Firewall proxy servers also operate at the firewall's application layer. Their main aim is to act as an intermediate between one network and another for a particular circumstance such as a specific network application. A proxy firewall prevents direct connections between either sides of the firewall. The firewall sides are commanded to commence the session through the proxy. This aids in either blocking or allowing specific traffic in the network based on the rules. It is essential to run a proxy service. This is done on each type of SECURITY TARGETS AND FUNCTIONALITY 3 internet application which is supported by the firewall. An example is the HTTP proxy for Web services. Sony can also use Application layer filter technology that first emerged in 1999. The technology allows firewalls to review, examine and filter packets on any OSI layer up to the application layer. Application-layer filtering has the capability to detect and block particular contents that pose a security threat to the systems. Such threats include malware as well as malicious websites. Application-layer filtering also identifies specific applications and protocols when they are being misused such as the HTTP and DNS. Firewall technology is now incorporated into a variety of devices. Majority of routers comprise of firewall components that include software-based firewalls. These firewalls have additional capabilities and functionality such as basic routing which is directed to the internal network they serve in protecting (Yan, Jian-Wen & Lin, 2015). Biometrics Sony also had the problem of their user’s credit card information being stolen. This is a very big security issue since most of their users pay for their services online with the use of credit card information. Biometrics will offer great functionality for Sony with regard to this issue. That is, biometrics will provide users with authentication for identification and access control, or for identifying individuals that are using these payment methods (He & Wang, 2015). SECURITY TARGETS AND FUNCTIONALITY 4 The biometric measure will provide a way for Sony’s users to be able to have unique identification aspects that will help make credit card information full proof and not susceptible to access by outside sources. For example, there can be use of fingerprint identification. Therefore, biometrics are significant in offering high-level management security operations. SECURITY TARGETS AND FUNCTIONALITY References Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611. He, D., & Wang, D. (2015). Robust biometrics-based authentication scheme for multiserver environment. IEEE Systems Journal, 9(3), 816-823. Horn, G. B., Meylan, A., & Kapoor, R. (2013). U.S. Patent Application No. 13/830,355. Yan, F., Jian-Wen, Y., & Lin, C. (2015, June). Computer Network Security and Technology Research. In 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation (pp. 293-296). IEEE. 5

Tutor Answer

(Top Tutor) Studypool Tutor
School: UCLA
Studypool has helped 1,244,100 students
flag Report DMCA
Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors